Ç¥ÁØÈ­ Âü¿©¾È³»

TTAÀÇ Ç¥ÁØÇöȲ

Ȩ > Ç¥ÁØÈ­ °³¿ä > TTAÀÇ Ç¥ÁØÇöȲ

Ç¥ÁعøÈ£ TTAK.KO-12.0339 ±¸Ç¥ÁعøÈ£
Á¦°³Á¤ÀÏ 2018-12-19 ÃÑÆäÀÌÁö 22
ÇѱÛÇ¥ÁØ¸í ³×Æ®¿öÅ© Æ÷·»½ÄÀ» À§ÇÑ ÆÐŶ ó¸® Áöħ
¿µ¹®Ç¥Áظí Guidelines of Packet Processing for Network Forensics
Çѱ۳»¿ë¿ä¾à ÀÌ Ç¥ÁØÀº ³×Æ®¿öÅ© Æ÷·»½Ä °úÁ¤¿¡¼­ ÆÐŶÀ» ó¸®ÇÏ´Â ÀýÂ÷¸¦ ±ÔÁ¤ÇÑ´Ù. ÆÐŶÀº ³×Æ®¿öÅ©¿¡¼­ »ç¿ëÀÚ ÇàÀ§¸¦ ºÐ¼®Çϴµ¥ Áß¿äÇÑ ÀÚ·á·Î È°¿ëÇÒ ¼ö ÀÖ´Ù. ±×·¯³ª ó¸® °úÁ¤ÀÇ ½Ç¼ö·Î ÀÎÇØ µ¥ÀÌÅÍ°¡ ÈѼյÊÀ¸·Î½á Áõ°Å·Î »ç¿ëÇÏÁö ¸øÇÒ ¼ö ÀÖÀ¸¸ç, °³ÀÎÁ¤º¸¿Í °°Àº ¹Î°¨ÇÑ Á¤º¸¸¦ Æ÷ÇÔÇÏ°í Àֱ⠶§¹®¿¡ À¯Ãâ·Î ÀÎÇÑ »ç»ýÈ° ħÇØ°¡ ¹ß»ýÇÒ ¼ö ÀÖ´Ù. µû¶ó¼­ ³×Æ®¿öÅ© Æ÷·»½Ä¿¡¼­ ÇÙ½É Áõ°ÅÀÎ ÆÐŶÀ» ¼öÁýÇÏ¿© ó¸®ÇÒ ¶§¿¡´Â Åõ¸íÇÏ°í ½Å·ÚÇÒ ¼ö ÀÖ´Â ÀýÂ÷°¡ Á¦½ÃµÇ¾î¾ß ÇÑ´Ù. º» Ç¥ÁØÀº ³×Æ®¿öÅ© Æ÷·»½Ä °úÁ¤À» ÅëÇØ Á¦½ÃµÈ ÆÐŶÀÌ µðÁöÅÐ Áõ°Å·Î¼­ Áõ°Å´É·ÂÀ» °®±â À§ÇØ ÆÐŶÀÇ ¼öÁý, º¸Á¸, Àü´Þ °úÁ¤¿¡¼­ ÁöÄÑ¾ß ÇÒ ¿øÄ¢À» Á¦½ÃÇÑ´Ù.
¿µ¹®³»¿ë¿ä¾à The standard establishes the necessary model and procedure while processing the packet for network forensics. Even though the packet is an important data to analyze user behavior through the network, reliable procedure should be suggested since it is easy be damaged due to careless handling, sensitive contents such as personal information is included, and can be modified intentionally. Therefore the standard defines the principles to be followed in packet collection, preservation, and delivery in order to have legal validity as the digital evidence through network forensic process.
±¹Á¦Ç¥ÁØ
°ü·ÃÆÄÀÏ TTAK.KO-12.0339.pdf TTAK.KO-12.0339.pdf            

ÀÌÀü
±¸Á¶È­µÈ À§Çù Á¤º¸ Ç¥Çö ±Ô°Ý (STIX 2.0)¿¡ ´ëÇÑ À¯½ºÄÉÀ̽º
´ÙÀ½
»çÀ̹ö °ø°Ý ´ëÀÀÀ» À§ÇÑ Áß¼Ò±â¾÷ Á¤º¸½Ã½ºÅÛ ¹é¾÷ Áöħ